Smartphone Forensics

Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more.

Course Code: IFIS/SCA/DF001

About this Course

Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more. Understanding how to leverage the data from the device in a correct manner can make or break your case and your future as an expert. This in-depth smartphone forensic course provides forensic examiners and investigators with advanced skills to detect, decode, decrypt, and correctly interpret evidence recovered from mobile devices. The course features hands-on training that allows students to analyse different datasets from smart devices and leverage the best forensic tools, methods, and custom scripts to learn how smartphone data hide and can be easily misinterpreted by forensic tools.

Smartphone technologies are constantly changing, and most forensic professionals are unfamiliar with the data formats for each technology. Take your skills to the next level: it’s time for the good guys to get smarter and for the bad guys to know that their smartphone activity can and will be used against them!

 

Target Audience

  1. Media exploitation analysts
  2. Accident reconstruction investigators
  3. Experienced digital forensic examiners
  4. Law enforcement officers, federal agents
  5. Information security professionals who respond to data breach incidents and intrusions
  6. Incident response teams tasked with identifying the role that smartphones played in a breach

Laptop Requirements

  1. CPU: A 64-bit Intel® x64 2.0+ GHz processor or higher-based system is mandatory for this course. (Important – Please read: a 64-bit system processor is mandatory)
  2. Wireless 802.11 B, G, N, or AC networking capability (required for labs and licensing).
  3. Bring an adapter or otherwise ensure that your laptop supports an Internet cable for connection, as the class will be hardwired
  4. USB 3.0 Port(s)
  5. 8 gigabytes of RAM minimum (more RAM (16 -32 GB) is recommended due to virtual machine requirements)
  6. 100 gigabytes of free space on your system hard drive

 

More about this course

  1. Getting Familiar with an Open Source framework for Automated Mobile Security Assessment.
  2. Learn about One Click Report Generation and Security Assessment.
  3. Learn how to deploy MobSF at your own environment so that you have complete control of the data. The data/report stays within the organisation and nothing is stored in the cloud.
  4. Perform Automated Security Assessment for both Android and iOS Applications.
  5. Learn about the semi Automatic Dynamic Analyzer for intelligent application logic based (whitebox) security assessments.

Target Audience

  1. Experienced digital forensic examiners
  2. Media exploitation analysts
  3. Information security professionals who respond to data breach incidents and intrusions
  4. Incident response teams tasked with identifying the role that smartphones played in a breach
  5. Law enforcement officers, federal agents, and
  6. Accident reconstruction investigators
  7. IT auditors who want to learn how smartphones can expose sensitive information
Not Enrolled
UGX 1,500,000 5 Days

Subscribe to Newletter

Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.